One day, another From iPhone and Mac that updates are ready. And from Chrome. And for Microsoft, with a patch on Tuesday, then another round on your plate. Experiments on how to do this on the road—why not just wait iOS 15 in a few weeks? – you will want to do this.
Yes, this is sound advice; you should keep your apps as up-to-date as possible. You can even turn on just the updates for everything and skip the editing of this book. But if you haven’t, today is a very good day to be on top of it, because Apple, Google, and Microsoft have all pushed protections in the last two days over the dangers that hackers are harassing. I am zero day patching extravaganza, and you don’t want to ignore your invitation.
Switch to your iPhone, Mac, and Apple Watch
The secretary general of the group has been a user chain called ForcedEntry. Allegedly arrested by the popular spy company NSO Group, the attack began in August, when the University of Toronto’s Citizen Lab Lab revealed it had found evidence of Attack “zero zero”, which do not want to join the target to catch, sent against human rights activists. Amnesty International he found parallel evidence of NSO Group malware program in July.
You can rightly ask: If the attack was reported a few weeks ago — and the attack has been taking place since February — why is the plan in place now? The answer is probably in part that Apple seems to be working with less until September 7, when Citizen Lab found out more about ForcedEntry’s use of a Saudi Arabian freedom fighter. Not only did he know that ForcedEntry not only looked at Apple’s photo library, but it also affected MacOS and watchOS in addition to iOS. On Sept. 13, Apple pushed all three retailers.
“We would like to thank Citizen Lab for successfully completing the task of finding some of these services so that we can address this as soon as possible,” said Ivan Krstić, Apple’s chief of security. “The attacks like the ones described above are extremely costly, costing millions of dollars to repair, often lasted a long time, and are used to fight off other people. While this does not mean that it does not threaten many of our users, we continue to work hard to protect all of our customers, and are only adding new security to their devices and their information. ”
It doesn’t just move; It is true that only a handful of Apple customers are at risk of accessing the NSO Group malware program on their phones. Important rule: If for any reason the legitimate government wants to read your documents, you could be at risk. So, work on it now with you, and be aware that a million dollars is coming.
Even if you don’t object, it’s important to push this. Now that some of these have come out, there is a chance that the ignorant will try to combat this same weakness. Also, it is good hygiene to keep your program as up-to-date as possible.
Ensuring that your iOS, MacOS, and WatchOS apps are up to date is automatically open. On your iPhone or iPad, go to Settings> General> App Update. Dinani Download and install to download iOS 14.8 on your device, and once there continue to switch to your download. Just keep in mind that the updates will not pass unless your phone is charged and connected to Wi-Fi overnight. You can change the Apple Watch from your iPhone; head to the Watch app, click My Watch tab, then More> App updates. From the clock, click Settings> General> software update. For macOS, go to Apple menu, then click System Preferences> Edit Now.
Upgrade Windows
Sorry Microsoft fans, you also have a hook. Last week, the company revealed that zero-day deployment on Windows is being put to good use. Instead of favoring the government agencies that NGO Group sells what they do, errors in MSHTML – a translation engine used by Internet Explorer and Microsoft Office – have become widespread among cyber makers.
“Microsoft is aware of the threats that are attempting to exploit this threat through the use of Microsoft Office’s state-of-the-art documentation,” the company said in a security statement last week. If you open a corrupted Office file, hackers may gain access to controls on your remote machine. And while Microsoft has previously outlined some ways you can prevent a successful attack even without a patch, security researchers say he quickly thought how to overcome workarounds. Not only that, but also as a Bleeping Computer security page reports this week, thieves have been sharing information on forums where they can use the risk for several days before the patch.